debatem1 / pypbcLinks
A defunct and ancient set of python bindings for Pairing Based Cryptography
☆52Updated last year
Alternatives and similar repositories for pypbc
Users that are interested in pypbc are comparing it to the libraries listed below
Sorting:
- Attribute-based Encryption☆207Updated 5 years ago
- Multi-Authority Attribute-based Encrypted Access Control System in Cloud Storage☆36Updated 6 years ago
- A library for cryptographic primitive implementations for Cloud Storage applications.☆282Updated 7 months ago
- Decentralized CP-ABE☆116Updated 6 months ago
- Traceable and Revocable Attribute-based Encryption in Java☆50Updated 6 years ago
- FAME CP-ABE Encryption based on JPBC☆28Updated 5 years ago
- Java realization for Ciphertext-Policy Attribute-Based Encryption☆185Updated 4 years ago
- ☆27Updated 6 years ago
- Implementation of some SSE schemes, including Sophos, Diana and Janus☆100Updated 4 years ago
- This code is algorithmic reproduction of A Traceable and Revocable Ciphertext-Policy Attribute-based Encryption Scheme Based on Privacy P…☆33Updated 2 years ago
- ☆55Updated 3 years ago
- Paper Notes in MPC with Applications to PPML☆70Updated last year
- Maintain a list of open source libraries of cryptographic excellence☆62Updated 2 years ago
- ☆20Updated 6 years ago
- Attribute-based Encryption☆26Updated 2 years ago
- pMPL: A Robust Multi-Party Learning Framework with a Privileged Party. This project is connected with the publication @ ACM CCS 2022.☆18Updated 11 months ago
- This project gives the python implementation of a space efficient searchable encryption algorithm☆54Updated 5 years ago
- This repository is some implementation of ABE (attribute-base encryption) scheme☆19Updated 4 years ago
- Private Set Intersection in the Internet Setting From Lightweight Oblivious PRF☆86Updated 3 years ago
- A Backward-Secure Searchable Encryption Scheme from Symmetric Puncturable Encryption☆42Updated 6 years ago
- fabric blockchain with medical data using privacy preserving technology☆11Updated 4 years ago
- This is the implementation of the policy-based chameleon hash function with black-box accountability PCHBA. We use PCHBA to secure blockc…☆35Updated 3 years ago
- CP-ABE-based-on-ECC-implementation☆12Updated 3 years ago
- Charm: A Framework for Rapidly Prototyping Cryptosystems☆610Updated last month
- ☆11Updated 5 years ago
- Practical Multi-party Private Set Intersection from Symmetric-Key Techniques[ACM CCS 2017]☆98Updated last year
- C++ OT extension implementation☆129Updated 4 years ago
- Flexible revocation in ciphertext-policy attribute-based encryption with verifiable ciphertext delegation.☆22Updated 2 years ago
- Oblivious Transfer, Oblivious Transfer Extension and Variations☆173Updated this week
- Materials about Privacy-Preserving Machine Learning☆253Updated 5 months ago